Font Size: a A A

Research On The Technology Of Injected Attack For Portable Executable File In Information War

Posted on:2011-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:T WangFull Text:PDF
GTID:2178330338986018Subject:Software engineering
Abstract/Summary:PDF Full Text Request
21th Century is a Information era. Information has been becoming the important strategic resource for developing of society. Social information-based has been trend and core of development in the world at the current time. Information safety will play an important role in the information society. Appearance of computer has made people's lives unprecedented convenient. But while people enjoy the scientific and technological progress, they usually suffer from the computer virus. Computer virus is a kind of man-made procedure or code and a kind of result when the information society has developed on some extent. To defend the virus in the past , people used to depend on the anti-virus software mostly, So they will turn pale at the very mention of the computer virus.And the virus also was been wraped around a mysterious veil. But at present, with the development of information techology on top speed, more users want to learn the computer virus and hope that they can clean the viruses by themselves. So analysis and research on the techology of making common virus, uncovering the spread mode of the most virus, it is great to contribute to the work of defending the computer virus attacking.The technology of injected attack for PE file is a kind of tecology to finish attacking the hostile targets and expand the effect of the attack by injecting the attack codes into the PE files.The Objects that are attacked involve widely,uasully people is very difficult to detect these attacks and the technology is suitable.In the technology of attack aspect,it is researched from PE file format,and analyse the principle of injecting the addition codes.It provides the method of the injecting attack implementation,and provides the solution of the key problem and difficult problem.In the In the spread mode of the attack,it researches from these three ways,e-mail,mobile storage devices and website,especially the mode of spread by e-mail and flash disk.
Keywords/Search Tags:Information safety, Portable executable file, Techology of injected attack, Spread mode of the virus
PDF Full Text Request
Related items